CVE-2020-3956

Description from NVD

VMware Cloud Director 10.0.x before 10.0.0.2, 9.7.0.x before 9.7.0.5, 9.5.0.x before 9.5.0.6, and 9.1.0.x before 9.1.0.4 do not properly handle input leading to a code injection vulnerability. An authenticated actor may be able to send malicious traffic to VMware Cloud Director which may lead to arbitrary remote code execution. This vulnerability can be exploited through the HTML5- and Flex-based UIs, the API Explorer interface and API access.

Information Acquisition Date:2020/07/01
CVSS 2.0: 6.5 MEDIUM CVSS 3.x: 8.8 HIGH

Description from Forti

VMware Cloud Director Expression Language Injection

This indicates an attack attempt to exploit an Expression Language Injection Vulnerability in VMware Cloud Director.This vulnerability is due to insufficient handling of HTTP request. Successful exploitation results in the execution of arbitrary code on the target system.

Information Acquisition Date:2020/07/01

Affected Products

VMware Cloud Director 10.0.x prior to 10.0.0.2
VMware Cloud Director 9.7.0.x prior to 9.7.0.5
VMware Cloud Director 9.5.0.x prior to 9.5.0.6
VMware Cloud Director 9.1.0.x prior to 9.1.0.4

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Applied latest upgrade or patch from the vendor:
https://www.vmware.com/security/advisories/VMSA-2020-0010.html

References

Refer to Information on External Sites

CVE InfomationExploits or more Infomation
mitreEXPLOIT DATABASE
NVD0day.today
vulmon.comgithub
CVE DetailsTwitter
JVN ENG JPN

Software Tag:



List of frequently cited URLs

URLNum of Times Referred to
http://www.sesin.at7371
http://newsbythehour.org/cybr31
https://lists.astaro.com/ASGV9-IPS-rules.html23
https://wp.me/p2olVJ-2zJ?utm_source=ReviveOldPost&utm_mediu...8
http://canyoupwn.me7
https://www.helpnetsecurity.com/2020/06/02/cve-2020-3956/6
https://securityboulevard.com/2020/06/vmware-vcenter-takeov...6
https://securityaffairs.co/wordpress/103538/security/cve-20...5
https://github.com/aaronsvk/CVE-2020-3956/4
https://thehackernews.com/2020/06/vmware-cloud-director-exp...4
https://www.vmware.com/security/advisories/VMSA-2020-0010.html3
https://twitter.com/TheHackersNews/status/12676932955237662...3
https://anthonyspiteri.net/cloud-director-cve-nightmare/3
https://ipssignatures.appspot.com/?cve=CVE-2020-39563
https://citadelo.com/en/blog/full-infrastructure-takeover-o...3
https://www.youtube.com/watch?v=TO40leo9y9w3

▼ Show Information from Twitter(13)


List of frequently cited URLs

URLNum of Times Referred to
www.sesin.at7371
newsbythehour.org31
lists.astaro.com23
wp.me8
canyoupwn.me7
www.helpnetsecurity.com6
securityboulevard.com6
securityaffairs.co5
github.com4
thehackernews.com4
www.vmware.com3
twitter.com3
anthonyspiteri.net3
ipssignatures.appspot.com3
citadelo.com3
www.youtube.com3

▼ Show Information from Twitter(13)


GitHub Search Results: Up to 10
NameURL
aaronsvk/CVE-2020-3956 https://github.com/aaronsvk/CVE-2020-3956

GitHub Search Results: Up to 10
NameURL
aaronsvk/CVE-2020-3956 github.com

2020/09/01 Score : 1
Added Har-sia Database : 2020/05/20
Last Modified : 2020/09/01
Highest Scored Date : 2020/06/02
Highest Score : 57